Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp10424687ybi; Wed, 24 Jul 2019 22:59:51 -0700 (PDT) X-Google-Smtp-Source: APXvYqx6dZ8Du1Hm6gCXSoKW7a8obINJgS85a+XVRLGVPPqLZGc0SDpiQSExZb+1voK4J4L2Z0jM X-Received: by 2002:a63:c751:: with SMTP id v17mr69513306pgg.264.1564034391218; Wed, 24 Jul 2019 22:59:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564034391; cv=none; d=google.com; s=arc-20160816; b=i1SRetuhyCvRUwqBmNW7/yZaQTZMDFj2ihtAvFggxjw+aQEf1wyh+iYtV98zRQ89vM 496YdRaLTClax4JBaWcjZ1CiaXt5g8BHOJZuwD2UxNVyqlMba36FGCtnQY+snxNZzg+m qbeDNDDsJTrOBNPdoIFvTMZSPF/6L5CkB0TqcaQcqOuNz4cfHhDJpJrPTx09aj7olGu/ QNstGyLkPCMXFq24fWcTysbpBZX6wWkW366KI0nYjDYorspDvW8EbTgXXiOeSlxoABgM 6o+ciITIQcN9zi3eLtpt9yo/c0JEiQ5eMWalhlRCCtE63MbISNnGDlV4TAQXmMLmqCnv Rurg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=H83ADQ+k+bTnoL7jtG9ppJFvZLDpFXOmyHBVLVxk3d0=; b=0a42fHzB35bteqMlV3NyZ+AoC0qoYj3ERYjYSJ2g3xrQVL0FyfzWxrqd0N/xzuDoIZ Yy8T7CLZaO34EqWLfDJ2c/oBkHRts3F1smT88/L6+EAS584vRoFlkMT6iBMMsAtw9+0x fBSjOKjERWEjj50462u386cR7w+PUh3fRs6tPI0SDTDC3UXn0ODIA5k4HAGZVf3tkhXL +s0m2aIWqamayVZriOXk+ShwJC4DbP+dg3t93LE0jEtsfKdhKxHNWOUcOA0Ltz/5o83A ICBqmU5+/7ZxMuGind7ipW+pcG2qE2AZF9KNRvgwntZsrj6LoB93pj8l1KAokKQqJWdc 8hvg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="gM8/Yf2o"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o21si14663271pll.169.2019.07.24.22.59.37; Wed, 24 Jul 2019 22:59:51 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="gM8/Yf2o"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390815AbfGYFmT (ORCPT + 99 others); Thu, 25 Jul 2019 01:42:19 -0400 Received: from mail.kernel.org ([198.145.29.99]:57192 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390802AbfGYFmR (ORCPT ); Thu, 25 Jul 2019 01:42:17 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 2B2A222BEB; Thu, 25 Jul 2019 05:42:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1564033336; bh=l9gRyO9IidlNojMDzg1+eyqr6O5J4ZzI0DHcDuMu6wM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=gM8/Yf2o7PnG46GYpj2W2tA7SeppZZkK0Uqe3Hixx2Jc580w5XyqB4qV/stpPloWJ k+qhFUx3FFjuMCAuHDX5XGMRmenbxj+ErO2Bl9pCZ1EYwYA18bTQuJCqYrNZm3XklB eAoIXVPShZBOmuhAcUcuNmb0Hh5MgnOC/mcVag8g= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Arnd Bergmann , Herbert Xu , Sasha Levin Subject: [PATCH 4.19 121/271] crypto: asymmetric_keys - select CRYPTO_HASH where needed Date: Wed, 24 Jul 2019 21:19:50 +0200 Message-Id: <20190724191705.645389360@linuxfoundation.org> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20190724191655.268628197@linuxfoundation.org> References: <20190724191655.268628197@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 90acc0653d2bee203174e66d519fbaaa513502de ] Build testing with some core crypto options disabled revealed a few modules that are missing CRYPTO_HASH: crypto/asymmetric_keys/x509_public_key.o: In function `x509_get_sig_params': x509_public_key.c:(.text+0x4c7): undefined reference to `crypto_alloc_shash' x509_public_key.c:(.text+0x5e5): undefined reference to `crypto_shash_digest' crypto/asymmetric_keys/pkcs7_verify.o: In function `pkcs7_digest.isra.0': pkcs7_verify.c:(.text+0xab): undefined reference to `crypto_alloc_shash' pkcs7_verify.c:(.text+0x1b2): undefined reference to `crypto_shash_digest' pkcs7_verify.c:(.text+0x3c1): undefined reference to `crypto_shash_update' pkcs7_verify.c:(.text+0x411): undefined reference to `crypto_shash_finup' This normally doesn't show up in randconfig tests because there is a large number of other options that select CRYPTO_HASH. Signed-off-by: Arnd Bergmann Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- crypto/asymmetric_keys/Kconfig | 3 +++ 1 file changed, 3 insertions(+) diff --git a/crypto/asymmetric_keys/Kconfig b/crypto/asymmetric_keys/Kconfig index f3702e533ff4..d8a73d94bb30 100644 --- a/crypto/asymmetric_keys/Kconfig +++ b/crypto/asymmetric_keys/Kconfig @@ -15,6 +15,7 @@ config ASYMMETRIC_PUBLIC_KEY_SUBTYPE select MPILIB select CRYPTO_HASH_INFO select CRYPTO_AKCIPHER + select CRYPTO_HASH help This option provides support for asymmetric public key type handling. If signature generation and/or verification are to be used, @@ -34,6 +35,7 @@ config X509_CERTIFICATE_PARSER config PKCS7_MESSAGE_PARSER tristate "PKCS#7 message parser" depends on X509_CERTIFICATE_PARSER + select CRYPTO_HASH select ASN1 select OID_REGISTRY help @@ -56,6 +58,7 @@ config SIGNED_PE_FILE_VERIFICATION bool "Support for PE file signature verification" depends on PKCS7_MESSAGE_PARSER=y depends on SYSTEM_DATA_VERIFICATION + select CRYPTO_HASH select ASN1 select OID_REGISTRY help -- 2.20.1